SlideShare una empresa de Scribd logo
1 de 14
Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
Second of TWO Things You Can’t Do 2.	May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes.  (c) Innovators Network 2009.
The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH-  You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose.  Intent is the key. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs.  Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years.  Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service.  Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA?   Answer: Maybe not.   (c) Innovators Network 2009.
Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.

Más contenido relacionado

La actualidad más candente

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium CopyrightRenee Hobbs
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright actmw15beye
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual propertyTawfig Tawill
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspaceHrishikeshBhorde
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspacerkpv2002
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in DigitisationAlastair Dunning
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts PresentationRobert Cogan
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright PresentationJonathan Ezor
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent GameAndrew Wong
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsJan Lindberg
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developersfreedeb
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...Tom Webster
 

La actualidad más candente (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium Copyright
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright act
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts Presentation
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent Game
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional Elements
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developers
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
 

Destacado

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1joostdevos
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speechdiscdogbob
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?discdogbob
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The FutureWout Hofman
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007guest9a4944a2
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonologyWout Hofman
 

Destacado (9)

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speech
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The Future
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonology
 
Graphic Design_RT
Graphic Design_RTGraphic Design_RT
Graphic Design_RT
 
Nup04102010
Nup04102010Nup04102010
Nup04102010
 
Portfolio_Illustrations
Portfolio_IllustrationsPortfolio_Illustrations
Portfolio_Illustrations
 

Similar a What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)ElaineLee
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Ip in it
Ip in itIp in it
Ip in itIP Dome
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)guest757c2c1
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...Evangeline
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignMassimo Menichinelli
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companiesJohan Örneblad
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfNeelHope
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptxNguyenNM
 
Copyright draft
Copyright draftCopyright draft
Copyright draftsgetchel
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draftsgetchel
 

Similar a What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't (20)

Drm
DrmDrm
Drm
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Ip in it
Ip in itIp in it
Ip in it
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open Design
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptx
 
Copyright draft
Copyright draftCopyright draft
Copyright draft
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draft
 

Último

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Último (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

  • 1. Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
  • 2. DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
  • 3. Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
  • 4. One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
  • 5. Second of TWO Things You Can’t Do 2. May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes. (c) Innovators Network 2009.
  • 6. The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
  • 7. Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH- You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
  • 8. Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose. Intent is the key. (c) Innovators Network 2009.
  • 9. Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs. Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
  • 10. Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years. Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
  • 11. Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service. Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA? Answer: Maybe not. (c) Innovators Network 2009.
  • 12. Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
  • 13. Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
  • 14. Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.